ECCouncil 312-50 - Certified Ethical Hacker Exam
The precaution of prohibiting employees from bringing personal computing devices into a facility is what type of security control?
A network administrator received an administrative alert at 3:00 a.m. from the intrusion detection system. The alert was generated because a large number of packets were coming into the network over ports 20 and 21. During analysis, there were no signs of attack on the FTP servers. How should the administrator classify this situation?
Which of the following can the administrator do to verify that a tape backup can be recovered in its entirety?
In order to show improvement of security over time, what must be developed?
Which of the following describes the characteristics of a Boot Sector Virus?
Which of the following programs is usually targeted at Microsoft Office products?
Which statement is TRUE regarding network firewalls preventing Web Application attacks?
Which of the following is a hardware requirement that either an IDS/IPS system or a proxy server must have in order to properly function?
Bluetooth uses which digital modulation technique to exchange information between paired devices?
A large company intends to use Blackberry for corporate mobile phones and a security analyst is assigned to evaluate the possible threats. The analyst will use the Blackjacking attack method to demonstrate how an attacker could circumvent perimeter defenses and gain access to the corporate network. What tool should the analyst use to perform a Blackjacking attack?